establishingsecurity / trustzone-rootkitLinks
TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.
☆14Updated 3 years ago
Alternatives and similar repositories for trustzone-rootkit
Users that are interested in trustzone-rootkit are comparing it to the libraries listed below
Sorting:
- Repo for fuzzing projects☆46Updated 5 years ago
- ☆48Updated 3 years ago
- Linux Kernel Snapshot Fuzzer using KVM☆48Updated last year
- A fast, multithreaded, ROP-gadget semantics analyzer.☆51Updated 4 years ago
- Ghidra analyzer for UEFI firmware.☆18Updated 2 years ago
- Banana Fuzzer ~ modulable, loop based, poc gen, code cov, platform agnostic, race oriented☆59Updated 3 years ago
- ☆19Updated 3 years ago
- ASPFuzz: Fuzzing the AMD SP's ROM bootloader with LibAFL using QEMU full-system emulation☆30Updated 2 years ago
- Companion to the "Introduction to VirtualBox security research" Blog Post☆31Updated 3 years ago
- ☆13Updated 3 years ago
- Tool to extract the kallsyms (System.map) from a memory dump☆28Updated 2 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Updated 3 years ago
- ☆30Updated 2 years ago
- binary ninja related code☆37Updated 7 months ago
- A simple, web based dashboard to use with LibAFL + OnDiskJSONMonitor☆24Updated last year
- An AFL scaling benchmarking tool☆18Updated 5 years ago
- kAFL Fuzzer☆34Updated 8 months ago
- PoC for CVE-2021-3492 used at Pwn2Own 2021☆42Updated 4 years ago
- A tool to perform so called BGE attack☆25Updated 5 months ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆36Updated 5 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆18Updated 5 years ago
- ☆43Updated 3 years ago
- ☆37Updated 4 years ago
- WINAFL for blackbox in-memory fuzzing (PIN)☆47Updated 6 years ago
- Investigating the bug behind CVE-2021-26708☆28Updated 4 years ago
- Esorics 2021 - Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains☆59Updated 3 years ago
- Breaking Secure Boot with SMM☆41Updated 3 years ago
- r2con 2020 CTF kernel challenge☆12Updated 5 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Updated last year
- ☆25Updated 11 months ago